| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| appwrite/server-ce | composer | < 1.0.0-RC1 | 1.0.0-RC1 |
The key vulnerability stemmed from using innerHTML to set element content without proper sanitization. The commit diff shows the exact line change from innerHTML to textContent in code.js, which is a classic XSS mitigation pattern. While no named function is explicitly shown in the diff, the script context handling user-controlled value parameter in form rendering is clearly the vulnerable point. This matches the advisory's description of stored XSS in various user-controlled fields.
KEV Misses 88% of Exploited CVEs- Get the report